28.05.2014 Views

uncovering and eliminating child pornography rings on the internet

uncovering and eliminating child pornography rings on the internet

uncovering and eliminating child pornography rings on the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2000] Child Pornography <strong>on</strong> <strong>the</strong> Internet 481<br />

provide better police training, (3) develop escrowed encrypti<strong>on</strong> <str<strong>on</strong>g>and</str<strong>on</strong>g> (4) use<br />

universal crime enforcement jurisdicti<strong>on</strong>. In additi<strong>on</strong>, internati<strong>on</strong>ally, <strong>the</strong><br />

nati<strong>on</strong>s of <strong>the</strong> world must: (1) forcefully encourage those nati<strong>on</strong>s who tolerate<br />

<strong>the</strong> possessi<strong>on</strong> <str<strong>on</strong>g>and</str<strong>on</strong>g>/or sale of <str<strong>on</strong>g>child</str<strong>on</strong>g> <str<strong>on</strong>g>pornography</str<strong>on</strong>g> to rethink <strong>the</strong>ir positi<strong>on</strong> <str<strong>on</strong>g>and</str<strong>on</strong>g><br />

amend <strong>the</strong>ir laws <str<strong>on</strong>g>and</str<strong>on</strong>g> (2) c<strong>on</strong>tinue to cooperate <str<strong>on</strong>g>and</str<strong>on</strong>g> coordinate law<br />

enforcement efforts.<br />

A. Increased Patrolling of <strong>the</strong> Internet<br />

As indicated in Part III, U.S. law enforcement is slowly beginning to<br />

increase its oversight of <strong>the</strong> Internet. 206 This is a positive step, but it must be<br />

exp<str<strong>on</strong>g>and</str<strong>on</strong>g>ed in order to be effective. In <strong>the</strong> words of Glenn Nick, a U.S.<br />

Customs agent who worked <strong>on</strong> <strong>the</strong> W<strong>on</strong>derl<str<strong>on</strong>g>and</str<strong>on</strong>g> case, "[t]here's much more<br />

activity than we're aware of, 207 [<str<strong>on</strong>g>and</str<strong>on</strong>g> Internet <str<strong>on</strong>g>child</str<strong>on</strong>g> pornographers] are going<br />

to get more sophisticated, get hidden deeper." 208 To combat this, we, as a<br />

nati<strong>on</strong>, must commit pers<strong>on</strong>nel <str<strong>on</strong>g>and</str<strong>on</strong>g> budget dollars 209 to diligent investigati<strong>on</strong>.<br />

B. Better Police Training<br />

1. Better Technical Training<br />

Because law enforcement has entered <strong>the</strong> Internet ra<strong>the</strong>r late in <strong>the</strong><br />

game, police are far behind Internet criminals in terms of technical<br />

sophisticati<strong>on</strong>. 210 Agencies must do everything in <strong>the</strong>ir power to overcome<br />

this experience gap. This includes learning as much as possible from <strong>the</strong><br />

mischievous, <str<strong>on</strong>g>and</str<strong>on</strong>g> sometimes malicious, computer experts known as<br />

hackers. 211 In additi<strong>on</strong>, police should take every possible opportunity to learn<br />

techniques directly from apprehended Internet <str<strong>on</strong>g>child</str<strong>on</strong>g> pornographers. 212<br />

206. See Claire Ann Koegler, The Informati<strong>on</strong> Highway Patrol: Here Come <strong>the</strong><br />

Cybercops, 22 NOVA L. REV. 513, 513 (1998) ("As communicati<strong>on</strong>s <strong>on</strong> <strong>the</strong> Internet become<br />

more <str<strong>on</strong>g>and</str<strong>on</strong>g> more a part of American culture, <strong>the</strong> law is evolving to regulate activities <strong>on</strong> <strong>the</strong><br />

Internet ("Net"). Various government agencies <str<strong>on</strong>g>and</str<strong>on</strong>g> private entities are patrolling <strong>the</strong> Net to<br />

crack down <strong>on</strong> tortious <str<strong>on</strong>g>and</str<strong>on</strong>g> criminal activities.").<br />

207. Allbritt<strong>on</strong> & McCshane, supra note 34, at A22.<br />

208. Id.<br />

209. See Deborah Radcliff, COMPUTER WORLD, Aug. 17, 1998, at 59, available at<br />

1998 WL 8437759 ("U.S. Customs <str<strong>on</strong>g>and</str<strong>on</strong>g> most local agencies sorely lack human resources,<br />

training <str<strong>on</strong>g>and</str<strong>on</strong>g> funds").<br />

210. See Allbritt<strong>on</strong> & McCshane, supra note 34, at A22 ("The Customs Cyber<br />

Smuggling operati<strong>on</strong> <strong>on</strong>ly opened a year ago, <str<strong>on</strong>g>and</str<strong>on</strong>g> authorities acknowledge <strong>the</strong>y are behind").<br />

211. See Radcliff, supra note 209, at 58 ("RSnake [a hacker] says he has passed <strong>on</strong><br />

tracking programs <str<strong>on</strong>g>and</str<strong>on</strong>g> training materials to law enforcement agencies. Ano<strong>the</strong>r group,<br />

www.pedowatch.com, offers a free, downloadable tool called Digger Engine, al<strong>on</strong>g with<br />

detailed techniques, to trace Internet Relay Chat users <str<strong>on</strong>g>and</str<strong>on</strong>g> Usenet posts.").<br />

212. See id. (reporting that in 1992, agents were at a loss as to how to combat <str<strong>on</strong>g>child</str<strong>on</strong>g>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!